Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    115. Which of the following parameters describe LM Hash: I - The maximum password length is 14 characters. II - There are no distinctions between uppercase and lowercase. III - It's a simple algorithm, so 10,000,000 hashes can be generated per second.

    A. I and II

    B. I, II, and III

    C. I

    D. II

    116. You are the Systems Administrator for a large corporate organization. You need to monitor all network traffic on your local network for suspicious activities and receive notifications when an attack is occurring. Which tool would allow you to accomplish this goal?

    A. Host-based IDS

    B. Proxy

    C. Firewall

    D. Network-based IDS

    < Prev.Page             CEHv9 Home             Next page>